Home

Description

NREL BEopt 2.8.0.0 contains a DLL hijacking vulnerability that allows attackers to load arbitrary libraries by tricking users into opening application files from remote shares. Attackers can exploit insecure library loading of sdl2.dll and libegl.dll by placing malicious libraries on WebDAV or SMB shares to execute unauthorized code.

PUBLISHED Reserved 2026-01-06 | Published 2026-01-07 | Updated 2026-01-08 | Assigner VulnCheck




HIGH: 8.6CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

Uncontrolled Search Path Element

Product status

2.8.0.0
affected

2.7.0.0
affected

2.6.0.1
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5513.php (Zero Science Lab Vulnerability Advisory) third-party-advisory

packetstormsecurity.com/files/152043 (Packet Storm Security Exploit Entry) exploit

cxsecurity.com/issue/WLB-2019030108 (CXSecurity Vulnerability Listing) third-party-advisory

exchange.xforce.ibmcloud.com/vulnerabilities/158065 (IBM X-Force Vulnerability Exchange) vdb-entry

web.archive.org/web/20190915095657/https://beopt.nrel.gov/ (BEopt Product Homepage) product

cve.org (CVE-2019-25268)

nvd.nist.gov (CVE-2019-25268)

Download JSON